Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Can I disable packet filtering while still keeping NAT to white list countries?

    Scheduled Pinned Locked Moved pfBlockerNG
    36 Posts 5 Posters 3.6k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • P
      paul2019 @johnpoz
      last edited by

      @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

      @paul2019 not sure what "inspection" pfsense would be doing unless your running IPS package - snort or suricata?

      Its a simple layer 3 firewall - to do really any inspection of traffic and say this is bad or this is not bad from signature or something you would need to be running one of the IPS packages.

      Gotcha, yeah I'm not running any of these packages, all I installed was pfblocker, my setup is super basic.

      johnpozJ 1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator @paul2019
        last edited by johnpoz

        @paul2019 if DF is set on a packet that it really shouldn't be on those could get dropped I guess.

        clear.jpg

        I believe there are many people around here that run sip and voip stuff that might have more experience with it than me.

        Do you have these captures you could post, you sniff on wan and lan at same time to see specific if pfsense was dropping a packet and not passing it on to the lan side?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        P 2 Replies Last reply Reply Quote 0
        • P
          paul2019 @johnpoz
          last edited by

          @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

          @paul2019 if DF is set on a packet that it really shouldn't be on those could get dropped I guess.

          I believe there are many people around here that run sip and voip stuff that might have more experience with it than me.

          Mine is unchecked, so that's correct?

          Firewall.jpg

          1 Reply Last reply Reply Quote 0
          • P
            paul2019 @johnpoz
            last edited by

            @johnpoz We also use this setup to get the calls working correctly, do you think disabling NAT just here on the NAT Outbound entry would help?

            NAT1.jpg

            NAT2.jpg

            johnpozJ 1 Reply Last reply Reply Quote 0
            • johnpozJ
              johnpoz LAYER 8 Global Moderator @paul2019
              last edited by

              @paul2019 no... Your natting a public IP? How would it work if you don't nat unless you were just routing public IP space..

              Are you devices behind pfsense using public IP space? That is routed to you?

              An intelligent man is sometimes forced to be drunk to spend time with his fools
              If you get confused: Listen to the Music Play
              Please don't Chat/PM me for help, unless mod related
              SG-4860 24.11 | Lab VMs 2.8, 24.11

              P 1 Reply Last reply Reply Quote 0
              • P
                paul2019 @johnpoz
                last edited by

                @johnpoz My devices are behind pfsense which is behind a router with a static public IP address.
                This setup above, the netgate support helped me up with last year (I had paid support back then), when I had some issues with calls not having audio at all, after they added that entry everything worked fine.

                johnpozJ 1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator @paul2019
                  last edited by

                  @paul2019 in that scenario pfsense itself was behind a nat. So pfsense was natting to some rfc1918 address that your edge router handed it..

                  Yeah a double nat could be very problematic to voice stuff..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  P 1 Reply Last reply Reply Quote 0
                  • P
                    paul2019 @johnpoz
                    last edited by

                    @johnpoz Gotcha, FO100E happens to the the VOIP hardware unit here.

                    So this is doing double NAT?

                    If so then I need to check that "Do not NAT" on this entry to stop it from doing it, and see if that breaks the VOIP audio or not.

                    johnpozJ 1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator @paul2019
                      last edited by

                      @paul2019 unless your isp device (edge router) is handing pfsense a public IP.. Then yeah your behind a double nat.

                      If its handing pfsense a public IP, and your device is getting rfc1918 from pfsense how would you turn off nat and expect anything to work.

                      Even if pfsense is getting rfc1918 from the edge router, is this edge router going to nat some different network? And then how would it know to send it back to pfsense? Your edge router would need to just nat anything it saw on its lan side to whatever its public Is, etc.

                      If they helped you last year and has been working - what exactly changed?

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      P 1 Reply Last reply Reply Quote 0
                      • P
                        paul2019 @johnpoz
                        last edited by

                        @johnpoz Yes it does handle a public IP to pfsense. The only change they did was to change the NAT to hybrid and add the entry as show above.

                        johnpozJ 1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator @paul2019
                          last edited by

                          @paul2019 and your saying that was working.. So what changed?

                          If you disable nat and pfsense has a public IP lets say 1.2.3.4 on its wan.. And you disable nat, then it would send traffic from whatever the IP of your device is - say 192.168.1.X -- and your isp device is natting this also your public IP?

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          P 1 Reply Last reply Reply Quote 0
                          • P
                            paul2019 @johnpoz
                            last edited by

                            @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

                            @paul2019 and your saying that was working.. So what changed?

                            If you disable nat and pfsense has a public IP lets say 1.2.3.4 on its wan.. And you disable nat, then it would send traffic from whatever the IP of your device is - say 192.168.1.X -- and your isp device is natting this also your public IP?

                            Before changing to hybrid and adding that entry it was "partially" working, some phones had audio issues and such (mute), after they added that entry above pointing to the VOIP unit local address (FO100E is an alias) the audio related issues were all solved.

                            We have Verizon fiber and I'm not positive how their device works, I have never logged in to it, don't even know if I can, but pfsense does have a public static ip address assigned to its WAN interface and the gateway is also a public static ip address, not a local address, this was supplied by Verizon.

                            johnpozJ 1 Reply Last reply Reply Quote 0
                            • johnpozJ
                              johnpoz LAYER 8 Global Moderator @paul2019
                              last edited by

                              @paul2019 I am asking what changed since they setup that no nat thing - has it been half working this whole time.. Or did something else change in your setup?

                              An intelligent man is sometimes forced to be drunk to spend time with his fools
                              If you get confused: Listen to the Music Play
                              Please don't Chat/PM me for help, unless mod related
                              SG-4860 24.11 | Lab VMs 2.8, 24.11

                              P 1 Reply Last reply Reply Quote 0
                              • P
                                paul2019 @johnpoz
                                last edited by

                                @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

                                @paul2019 I am asking what changed since they setup that no nat thing - has it been half working this whole time.. Or did something else change in your setup?

                                As far as of the network setup nothing changed, except firmware updates on the VOIP system, which I was suspecting to be the issue in the beginning.

                                The random audio issues have been gone since then, no more. Then we recently noticed while digging the login the SIP 486 errors, I can't confirm they have been happening since the beginning since we did a factory reset on the unit to try to fix this.

                                johnpozJ 1 Reply Last reply Reply Quote 0
                                • johnpozJ
                                  johnpoz LAYER 8 Global Moderator @paul2019
                                  last edited by johnpoz

                                  @paul2019 if pfsense is in fact dropping packets its easy enough to see.. Do a sniff on wan same time you doing on one lan.. And look for packets entering the wan, but not being sent on out the lan. Or the reverse - packets coming in to lan, and not leaving the wan..

                                  you can do this easy enough with just tcpdump on pfsense vs the gui.. you can do one in gui, and other via tcpdump via ssh to pfsense, etc.

                                  What exactly did you send the vendor where they said the firewall was dropping packets.. If its not showing both sides of pfsense then it was a guess on their part..

                                  Always easier to blame the customers equipment.. ;) I find it hard to believe pfsense is just randomly dropping packets, but until you have proof either way can not be ruled out. But pfsense without an IPS is not going to be "inspecting" anything and saying - oh lets drop this packet, etc.

                                  If it was that DF set thing - you can see if DF is set on a packet coming into the wan or entering the lan, etc. in your packet capture.

                                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                                  If you get confused: Listen to the Music Play
                                  Please don't Chat/PM me for help, unless mod related
                                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                                  P 2 Replies Last reply Reply Quote 0
                                  • P
                                    paul2019 @johnpoz
                                    last edited by paul2019

                                    @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

                                    @paul2019 if pfsense is in fact dropping packets its easy enough to see.. Do a sniff on wan same time you doing on one lan.. And look for packets entering the wan, but not being sent on out the lan. Or the reverse - packets coming in to lan, and not leaving the wan..

                                    you can do this easy enough with just tcpdump on pfsense vs the gui.. you can do one in gui, and other via tcpdump via ssh to pfsense, etc.

                                    What exactly did you send the vendor where they said the firewall was dropping packets.. If its not showing both sides of pfsense then it was a guess on their part..

                                    I'm going to have look at this tcpdump on the pfsense today.

                                    The VOIP unit has a built-in packet capture tool, I turned it on and let it run till the SIP error happened, then I sent the dump to them with the precise date and time the error happened.

                                    tool.jpg

                                    johnpozJ S 2 Replies Last reply Reply Quote 0
                                    • johnpozJ
                                      johnpoz LAYER 8 Global Moderator @paul2019
                                      last edited by johnpoz

                                      @paul2019 there is no real way they can say from a sniff on their device that your firewall dropped anything.. Al they could see from sniff on their device is no answer was received.. Or they didn't get something they were expecting. How can you tell where something was dropped?

                                      if I send a packet to 1.2.3.4 and don't get an answer - sure sniffing on my device I can see I put a packet on the wire, but got no response.. But where was it dropped, in the local network, at the firewall, in the internet some where, maybe the place I was sending it got it and just didn't answer.

                                      To know where something is being dropped you have to be able to check on the in and out of that something that is going to process the traffic..

                                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                                      If you get confused: Listen to the Music Play
                                      Please don't Chat/PM me for help, unless mod related
                                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                                      P 1 Reply Last reply Reply Quote 0
                                      • P
                                        paul2019 @johnpoz
                                        last edited by

                                        @johnpoz said in Can I disable packet filtering while still keeping NAT to white list countries?:

                                        @paul2019 there is no real way they can say from a sniff on their device that your firewall dropped anything.. Al they could see from sniff on their device is no answer was received.. Or they didn't get something they were expecting. How can you tell where something was dropped?

                                        if I send a packet to 1.2.3.4 and don't get an answer - sure sniffing on my device I can see I put a packet on the wire, but got no response.. But where was it dropped, in the local network, at the firewall, in the internet some where, maybe the place I was sending it got it and just didn't answer.

                                        To know where something is being dropped you have to be able to check on the in and out of that something that is going to process the traffic..

                                        You're right, only with a traffic dump from the pfsense itself they would be able to tell that, if that was the case.

                                        I will do a packet capture on the pfsense itself and send it to them.

                                        johnpozJ 1 Reply Last reply Reply Quote 0
                                        • johnpozJ
                                          johnpoz LAYER 8 Global Moderator @paul2019
                                          last edited by johnpoz

                                          @paul2019 you really need both in and out of pfsense to tell if pfsense itself is not passing on traffic that it should..

                                          I mean you could sniff at pfsense wan and their device and see hey something is getting lost.. But until you actually sniff on pfsense lan interface as well - how are you sure pfsense got it.. I mean you can assume your network didn't drop it.. but you can not be sure.

                                          We had a case where a switch was dropping udp 53 packets.. Sometimes.. This was causing issues with dns.. But we had narrow it down via the full path in the DC to find out where it was being dropped. And sure enough sniff on one specific switch showed it coming into the switch, but not leaving the switch... So you can not always assume something is passing traffic that it should until you validate where the traffic is actually getting loss.

                                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                                          If you get confused: Listen to the Music Play
                                          Please don't Chat/PM me for help, unless mod related
                                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                                          1 Reply Last reply Reply Quote 0
                                          • S
                                            SteveITS Galactic Empire @paul2019
                                            last edited by

                                            @paul2019 Using a static port for outbound NAT is not uncommon; 3CX requires it if the server is on-premises. It prevents pfSense from randomizing the source port, which is normally done.

                                            Agree, without Snort/Suricata, packets don’t randomly drop. unless packet loss…?

                                            Since you mention a second router are you sure THAT is not involved is the problem? Another thing commonly needed is to disable SIP-ALG or similar “helper” features. It’s off in pfSense; check your other router and/or phone server configuration directions.

                                            Re:disabling pf…no need to worry about allowing certain IPs, with the firewall disabled everything is allowed…though NAT doesn’t work.

                                            Pre-2.7.2/23.09: Only install packages for your version, or risk breaking it. Select your branch in System/Update/Update Settings.
                                            When upgrading, allow 10-15 minutes to restart, or more depending on packages and device speed.
                                            Upvote 👍 helpful posts!

                                            P 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.